Skip to main content

Ethical Hacking simplified Network topology (Fundamnetals of system).





Network Topology

Before you attack or prevent attacking on anything, you need to know how the system works. One of the most important thing to know its fundamentals is the network. Today I'm introducing you to networking fundamental.
A network is the interconnection of two or more devices to share common resources (data, peripherals etc). Since we are just going to brush through networking there is no need to dive deep.

Network topology
Network topology is a graphical representation of the network. Network topology again can be seen as map of the network, because it represent how all the devices are connected and how they are using the network.
Classifications of topology
Physical topology represent how each devices is located, physical location, cable wiring etc.
Logical topology represents how the devices used the network regardless of their location, it grouped the devices based on their logical addresses, software installed etc.

Basic Network topologies
  • Bus topology: As the name implies, devices are connected in a bus-chairs like manner. Bus topology has a single backbone where all devices will connect. Example is an extension box which we connect all our devices to power through it. When the cable to the main switch failed all devices cant power up, they will all fail because they are all connected to one device (backbone). This is exactly what happens to bus network, when the backbone fails it affect all the devices. Technically the network is in trouble!
  • Star topology: This topology connects all the devices though a single network device. A star topology doesn't have any backup or redundant connection, to help reduce network failure when the network device failed. 
     
  • Ring topology: This topology connect devices in a circle manner, just like how a ring is. Ring networks like bus networks connects all devices through a backbone. When the backbone fails you definitely knew what will happens. wink
     
  • Mesh: This topology makes sure all devices are connected directly to each and every device on the network. This is the best network to implement though it costly, but it worth it because of its robustness.
  • Hybrid This is a network that uses more than one network topology.

    to be continued

     Join us on 
    BBm channel: ICTmagazine  Facebook: ICTmagazine


Comments

Popular posts from this blog

Microsoft Office for Tablet now on Google Play store

Back in November, Microsoft opened up early previews builds for its new mobile Office applications for Android tablets to those willing to sign up and wait for an invitation. After taking on feedback over the past couple of months, Microsoft has announced that it is expanding its preview scheme by releasing its Office applications to everyone directly through the Google Play Store. The new Office software for mobile unifies Android, IOS, and Windows platforms. Previously each platform had to make do with its own apps, meaning that feature sets differed depending on your operating system and updates were often slow and intermittent. By unifying the Office platform, Microsoft hopes to bring updates and new features to users in a timelier manner. There are still a couple of conditions attached to the preview builds though. Firstly, Office is still limited to ARM-based Android tablets with a screen size between 7 and 10.1 inches. Your tablet will also need to be running Ki...

Ethical Hacking Simplified. Applications of Cryptography

Pretty good Privacy PGP This type of cryptographic Application uses Public key encryption system and  is one of the most popular means of encryption in the world. It is used in securing data, data storage, email, Instant Messaging (instant messaging are messaging system that happens in real time, just like whatsApp, Facebook messenger etc.) and other forms of communication. The early version of this cryptographic application was written by Philip Zimmerman and has it public appearance in 1991. it is part of an open-source project with many version where user can choose the best that suit them. This cryptographic application comes with privacy and security measure that are found in many online systems. The data will travel in an encrypted form (chipertext), upon arriving at the receiving end, the receiving will use PGP to decrypt the data back to plaintext. PGP uses the Public/Private key encryption. Where the sender uses his public key to encrypt data, and the receiver ...

Tips for strong password

As we have already discussed that passwords are strong and at the same time weak! If user create password from his name, date of birth or any other combination that is related to him, cracking down his account doesn't need much technical know how. Meaning attacker who know you, can be lucky enough to access your sensitive information by only entering certain key combinations. Creating strong and almost non hackable wait!!! is there any non hackable password! I was once told that any system can be hacked! It only took time, skills and resources! You are absolutely right! But at-least one has to really suffer before getting your data! Arm robbers do rob banks! Do you think a local or common thief can rob bank? The ans is absolute NO! Strong passwords doesn't happen by chance! Below are the steps to create a very strong passwords! Passwords should be at-least 8 characters Its already becoming standard on the internet. Many websites doesn't allow less than 6 charact...